Scan Report
45 /100
sshot
Take full screen screenshot using PowerShell
The skill delegates execution to an opaque external PowerShell script that is not included in the package, creating an unauditable blind spot where undeclared behavior could occur without being detected.
Use with caution
Do not deploy until the referenced PowerShell script at C:\Users\AlenZhu\.openclaw\scripts\sshot.ps1 is provided and audited. Verify the script only captures screenshots and does not access sensitive paths, exfiltrate data, or execute undeclared commands.
Attack Chain 3 steps
◎
Entry Skill presents as a simple screenshot utility through SKILL.md
SKILL.md:1⬡
Escalation Skill delegates execution to opaque external script at C:\Users\AlenZhu\.openclaw\scripts\sshot.ps1 with ExecutionPolicy Bypass, bypassing PowerShell security controls
SKILL.md:11◉
Impact External script is unauditable — could harvest credentials, exfiltrate data, or execute arbitrary commands without any record in the skill package
External: sshot.ps1Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| High | Critical script artifact not included in package Doc Mismatch | SKILL.md:11 |
| Medium | Hardcoded user-specific path in skill definition Sensitive Access | SKILL.md:11 |
| Medium | ExecutionPolicy Bypass weakens PowerShell security controls Doc Mismatch | SKILL.md:10 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md:11 - system.run on node |
| Filesystem | NONE | UNKNOWN | ✓ Aligned | External script sshot.ps1 not provided; behavior cannot be audited |
| Network | NONE | UNKNOWN | ✓ Aligned | External script sshot.ps1 not provided; network behavior cannot be audited |
File Tree
3 files · 1.0 KB · 34 lines Markdown 2f · 30L
JSON 1f · 4L
├─
▾
clawhub
│ └─
SKILL.md
Markdown
├─
meta.json
JSON
└─
SKILL.md
Markdown
Security Positives
✓ No base64-encoded payloads or obfuscated code found
✓ No direct credential harvesting loops over environment variables
✓ No curl|bash or wget|sh remote script fetching in visible files
✓ No evidence of reverse shell, C2, or data exfiltration in provided files
✓ The described behavior (taking a screenshot) is a legitimate, well-defined feature